The Twitter 5.0 app for the iPhone is vulnerable to eavesdropping via [Man In The Middle][1], this vulnerability can lead an attacker on the same local area network (LAN) to capture and/or modify pictures the victim is seeing on the Twitter app.
Credit:
The information has been provided by Carlos Reventlov.
The Twitter app communicates with the Twitter API via HTTPs connections,however, picture images server by *.twimg.com are received through simple HTTP.
Proof of concept
Read http://reventlov.com/advisories/twitter-app-vulnerable-to-partial-mitm to see the PoC's screen captures.
This custom [hyperfox][2] server will listen on `:9999`. This PoC captures pictures the user is seeing and sends a bogus picture (`spoof.jpg`) instead of the original. Read the [hyperfox][2] docs to know how to launch this PoC.
Only images on the *.twimg.com domain are targeted.
if err != nil {
log.Printf(fmt.Sprintf("Failed to bind: %s.\n", err.Error()))
}
}
```
Disclosure Timeline:
* Nov 10, 2012 Vulnerability discovered.
* Nov 10, 2012 Vendor contacted.
* Nov 15, 2012 Vendor response: "planned to be fixed on next release".
* Nov 15, 2012 New release 5.1, bug is patched.
* Nov 16, 2012 Full disclosure.